Static task
static1
Behavioral task
behavioral1
Sample
3e1855975ce07c25a5fcc8732808f66b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e1855975ce07c25a5fcc8732808f66b.exe
Resource
win10v2004-20231215-en
General
-
Target
3e1855975ce07c25a5fcc8732808f66b
-
Size
25KB
-
MD5
3e1855975ce07c25a5fcc8732808f66b
-
SHA1
74c47ce26354d8a0f197eff0029d991c80bb35aa
-
SHA256
83ad0798ffbc53d3f6c96e47fbed76ad3d40172ed1f53d4162f50062a91fee6e
-
SHA512
a32dca9cccfe5415ceb72c944a0d18a321f89a03900b8444e04909dd924ea209979dad63ada4f6d524b7d48a4f017f369eb9639f71cff5ab58a37b8de1d2f6c2
-
SSDEEP
192:WxlghlKmSzy25BUZhN+ztetVrfjX/0w/lCL0t5M0K8aXnw3rLc21W3gbP8XT1O5h:WIhlAzYEBGR/QO51K8b3q0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e1855975ce07c25a5fcc8732808f66b
Files
-
3e1855975ce07c25a5fcc8732808f66b.exe windows:4 windows x86 arch:x86
9439b1682e658f97d53e5da2ea201686
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__main
abort
atoi
calloc
close
connect
cygwin_internal
dll_crt0__FP11per_process
exit
fprintf
free
gethostbyname
herror
htons
inet_addr
malloc
memcpy
memset
ntohs
pthread_mutex_lock
pthread_mutex_unlock
read
realloc
select
sleep
socket
strlen
strtoul
write
kernel32
AddAtomA
FindAtomA
GetAtomNameA
GetModuleHandleA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 112B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yvs Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE